Hackers compromise Adobe server, use it to digitally sign malicious files

28.09.2012
The story, "Hackers compromise Adobe server, use it to digitally sign malicious files," was inadvertently posted to the wire Friday during the editing process.

The story has been fixed on the wire, and the corrected paragraphs seven, eight and 19 follow:

Paragraphs seven and eight:

Brad Arkin, Adobe's senior director of security for products and services, wrote in a that the rogue code samples have been shared with the Microsoft Active Protection Program (MAPP) so security vendors can detect them. Adobe believes "the vast majority of users are not at risk" because tools like the ones that were signed are normally used during "highly targeted attacks," not widespread ones, he .

"At the moment, we have flagged all the received samples as malicious and we continue monitoring their geographical distribution," Botezatu said. BitDefender is one of the security vendors enrolled in MAPP.

Paragraph 19: